Secure data transmission in cloud environment using visual cryptography and genetic algorithm: A review

被引:0
|
作者
Mamta [1 ]
Khare, Mayank Deep [1 ]
Yadav, Chandra Shekhar [1 ]
机构
[1] NIET, Greater Noida, Uttar Pradesh, India
来源
2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN CONTROL, COMMUNICATION AND INFORMATION SYSTEMS (ICICCI-2017) | 2017年
关键词
Cloud computing; visual cryptography; Encryption; Decryption; Secret key; Genetic Algorithm; Crossover; Mutation; Critical Index;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Now a day's Cloud Computing is the great concept in the development of an on-demand network which provides access to a common pool of configurable resources that can be rapidly provisioned and released with minimal management effort or service provider interaction where Infrastructure, Platform, and Software can be accessed as a service. Cloud Computing provides reimbursement in terms of low cost and convenience of data, but its unique feature is its security. Sharing of data is an imperative functionality in cloud storage. In Cloud computing environment the sharing of data and transfer has increased exponentially. There are the various factors in data security like integrity, confidentiality, and authentication services. Maintaining secrecy and protection for critical data are highly challenging, particularly when data are stored in memory or send via any communication networks. I have reviewed several papers regarding our concept and what I found is that in some papers, GA has been used for security, In other papers used GA, VC, and Steganography together for enhancing security. But some are providing security quite well, having high overhead. And those which have low overhead, have poor security. In this paper we have described the genetic algorithm and visual cryptography related papers which helps to know the all areas where these techniques will be used. Genetic algorithm is used for providing encryption and decryption, for hiding critical data we are using visual cryptography
引用
收藏
页码:413 / 416
页数:4
相关论文
共 50 条
  • [31] Secure and efficient data access control in cloud computing environment: A survey
    Namasudra, Suyel
    Roy, Pinki
    MULTIAGENT AND GRID SYSTEMS, 2016, 12 (02) : 69 - 90
  • [32] Secure data storage and retrieval system using hybridization of orthogonal knowledge swarm optimization and oblique cryptography algorithm in cloud
    Reddy, N. Madhusudhana
    Ramesh, G.
    Kasturi, Srinivasa Babu
    Sharmila, D.
    Gopichand, G.
    Robinson, L. Thomas
    APPLIED NANOSCIENCE, 2022, 13 (3) : 2449 - 2461
  • [33] A Review: Cryptography and Steganography Algorithm for Cloud Computing
    Singla, Surbhi
    Bala, Anju
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 953 - 957
  • [34] An Approach For Securing Data On Cloud Using Data Slicing And Cryptography
    Bobde, Rupesh R.
    Khaparde, Amit
    Raghuwanshi, M. M.
    PROCEEDINGS OF 2015 IEEE 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO), 2015,
  • [35] Efficient task allocation approach using genetic algorithm for cloud environment
    Rekha, P. M.
    Dakshayini, M.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (04): : 1241 - 1251
  • [36] Efficient task allocation approach using genetic algorithm for cloud environment
    P. M. Rekha
    M. Dakshayini
    Cluster Computing, 2019, 22 : 1241 - 1251
  • [37] A novel hybrid dwarf-based Archimedes optimization (HDAO) algorithm for preserving secure data in a cloud computing environment
    Alandjani, Gasim
    Soft Computing, 2024, 28 (23) : 13371 - 13387
  • [38] A Novel Technique for Secure Information Transmission in Videos Using Salt Cryptography
    Sharma, Nagesh
    Rathi, Rakesh
    Jain, Vinesh
    Saifi, Mohd. Waseem
    3RD NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2012), 2012,
  • [39] An Intelligent 2D Secret Share Construction using Visual Cryptography for Secure Transmission
    Kumar, N. Rajesh
    Krishnan, R. Bala
    Manikandan, G.
    Raajan, N. R.
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (07): : 2862 - 2878
  • [40] A New Approach for Maintaining Data Security using Cryptography in a Hybrid Cloud Environment
    Jebaseli, Nisha
    Banu, A. Fairose
    JOURNAL OF ALGEBRAIC STATISTICS, 2022, 13 (02) : 214 - 224